@marcan42 Yeah, but I was under the assumption those PIN crackers are using jailbreak methods to abuse the process; not Apple tools.
-
-
Replying to @ScooterComputer
@ScooterComputer No jailbreak. If they injected software they wouldn't need to crack anything. It's the replay attack except abusing a bug.1 reply 0 retweets 0 likes -
Replying to @marcan42
@ScooterComputer ... basically a race condition that means that if you power down the phone fast enough the retry counter isn't incremented.1 reply 0 retweets 0 likes -
Replying to @marcan42
@ScooterComputer (they fixed that in newer iOS versions)1 reply 0 retweets 0 likes -
Replying to @ScooterComputer
@ScooterComputer Right, because they fixed the NAND update race condition. But the mechanism is the same, you just need a full NAND sim now.1 reply 0 retweets 0 likes -
Replying to @ScooterComputer
@ScooterComputer They can't start a process to listen for PINs (not jailbroken); AFAIK that is a built in feature.1 reply 0 retweets 0 likes -
Replying to @marcan42
@ScooterComputer It is possible, however, that it got removed in iOS 9 (maybe it was unintentional). I don't know if it did.2 replies 0 retweets 0 likes -
Replying to @marcan42
@marcan42 I think it did…wasn't that one of the things@JZdziarski documented in the "diagnostic tools"?1 reply 0 retweets 0 likes
@ScooterComputer @JZdziarski Maybe? Got any references? I assumed it was either either an iTunes protocol feature or HID input.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.